What is a function of the application hardening process'?
What is a function of the application hardening process'?A . Perform penetration testing and validate OS patch management B. Disable unnecessary application features or services C. Isolate VM network to ensure the default VM configurations are unchanged D. Validate unused application files and programs to ensure consistencyView AnswerAnswer: B Explanation:...
Which technology allows automation of sensors and devices to share and process information?
Which technology allows automation of sensors and devices to share and process information?A . Internet of Things B. Cloud computing C. Artificial Intelligence D. Deep LearningView AnswerAnswer: A
What is a function of a continuous data protection (CDP) appliance?
What is a function of a continuous data protection (CDP) appliance?A . Migrates deduplicated data from the source volume to the target volume during replication B. Manages both local and remote replications within and across data centers C. Stores all data that has changed from the time the replication session...
Refer to the Exhibit:
Refer to the Exhibit: Identify the following FC Frame fields:A . 1CRC 2:Data field 3:Frame header B. 1:Frame header 2:Data field 3CRC C. 1CRC 2:Frame header 3:Data field D. 1:Frame header 2CRC 3:Data fieldView AnswerAnswer: B Explanation: https://www.mycloudwiki.com/san/fc-san-protocols/ an FC frame consists of five parts: start of frame (SOF), frame...
What type of FC port does the "X" represent?
Refer to the Exhibit: What type of FC port does the "X" represent?A . F_port B. NI_port C. N_port D. E_portView AnswerAnswer: C
In a NAS environment, which file system enables file sharing with Windows clients and uses the TCP/IP protocol?
In a NAS environment, which file system enables file sharing with Windows clients and uses the TCP/IP protocol?A . New Technology File System (NTFS) B. Hadoop Distributed File System (HDFS) C. Common Internet File System (CIFS) D. Network File System (NFS)View AnswerAnswer: C
In continuous data protection, what does the amount of journal space determine?
In continuous data protection, what does the amount of journal space determine?A . Length of time required to recover the data B. Amount of space the source and replica volumes require C. Amount of data that can be restored to a specific point D. How far back the data can...
What is the MTBF of Port 5?
An Ethernet switch has eight ports and all ports must be operational for 24 hours; from Monday through Friday. However, a failure of Port 5 occurs as follows: Tuesday = 6 AM to 7 AM Thursday = 5 PM to 9 PM Friday = 8 AM to 9 AM What...
What statement describes machine learning?
What statement describes machine learning?A . Applies an algorithm to large amounts of data for pattern discovery B. Organizes data efficiently so that compute systems can learn C. Developing a program to compute every possible outcome D. Replicating a detailed process and then implementing it in softwareView AnswerAnswer: A Explanation:...
Which type of zoning does the “X” represent?
Which type of zoning does the “X” represent? A . Fabric zoning B. WWN zoning C. Mixed zoning D. Port zoningView AnswerAnswer: A